Weekend Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dm70dm

CNX-001 CompTIA CloudNetX Exam Questions and Answers

Questions 4

A user reports an issue connecting to a database server. The front-end application for this database is hosted on the company's web server. The network engineer has changed the network subnet that the company servers are located on along with the IP addresses of the servers. These are the new configurations:

    New subnet for the servers is 10.10.10.64/27

    Web server IP address is 10.10.10.101

    Database server IP is 10.10.10.93

Which of the following is most likely causing the user's issue?

Options:

A.

The web application server is not forwarding the requests.

B.

The database server firewall is blocking the port to the database.

C.

The DNS server is not resolving properly.

D.

The web server does not have the correct network configuration.

Buy Now
Questions 5

A cloud network engineer needs to enable network flow analysis in the VPC so headers and payload of captured data can be inspected. Which of the following should the engineer use for this task?

Options:

A.

Application monitoring

B.

Syslog service

C.

Traffic mirroring

D.

Network flows

Buy Now
Questions 6

A network architect is creating a network topology for a global SD-WAN deployment. The business has offices in Asia, Europe, and the United States and makes use of data centers in theUnited States and Europe. Most traffic between sites must have the lowest latency possible. Which of the following topologies best meets this requirement?

Options:

A.

Star

B.

Spine-and-leaf

C.

Mesh

D.

Hub-and-spoke

Buy Now
Questions 7

A network architect is designing an expansion solution for the branch office network and requires the following business outcomes:

    Maximize cost savings with reduced administration overhead

    Easily expand connectivity to the cloud

    Use cloud-based services to the branch offices

Which of the following should the architect do to best meet the requirements?

Options:

A.

Design a SD-WAN solution to integrate with the cloud provider; use SD-WAN to connect branch offices to the cloud provider.

B.

Design point-to-site branch connectivity for offices to headquarters; deploy ExpressRoute and/or DirectConnect between headquarters and the cloud; use headquarters connectivity to connect to the cloud provider.

C.

Design an MPLS architecture for the branch offices and site-to-site VPN between headquarters and branch offices; use site-to-site connectivity to the cloud provider.

D.

Design a dark fiber solution for headquarters and branch offices' connectivity; deploy point-to-site VPN between headquarters and the cloud provider; use the headquarters connectivity to the cloud provider.

Buy Now
Questions 8

A cloud architect needs to change the network configuration at a company that uses GitOps to document and implement network changes. The Git repository uses main as the default branch, and the main branch is protected. Which of the following should the architect do after cloning the repository?

Options:

A.

Use the main branch to make and commit the changes back to the remote repository.

B.

Create a new branch for the change, then create a pull request including the changes.

C.

Check out the development branch, then perform and commit the changes back to the remote repository.

D.

Rebase the remote main branch after making the changes to implement.

Buy Now
Questions 9

An organization with an on-premises data center is adopting additional cloud-based solutions. The organization wants to keep communication secure between remote employees' devices and workloads. Which of the following ZTA features best achieves this goal?

Options:

A.

Secure service edge

B.

Cloud access security broker

C.

Principle of least privilege

D.

Identity as the perimeter

Buy Now
Questions 10

A security architect needs to increase the security controls around computer hardware installations. The requirements are:

    Auditable access logs to computer rooms

    Alerts for unauthorized access attempts

    Remote visibility to the inside of computer rooms

Which of the following controls best meet these requirements? (Choose two.)

Options:

A.

Video surveillance

B.

NFC access cards

C.

Motion sensors

D.

Locks and keys

E.

Security patrols

F.

Automated lighting

Buy Now
Questions 11

An application is hosted on a three-node cluster in which each server has identical compute and network performance specifications. A fourth node is scheduled to be added to the cluster with three times the performance as any one of the preexisting nodes. The network architect wants to ensure that the new node gets the same approximate number of requests as all of the others combined. Which of the following load-balancing methodologies should the network architect recommend?

Options:

A.

Round-robin

B.

Load-based

C.

Least connections

D.

Weighted

Buy Now
Questions 12

A network administrator recently deployed new Wi-Fi 6E access points in an office and enabled 6GHz coverage. Users report that when they are connected to the new 6GHz SSID, the performance is worse than the 5GHz SSID. The network administrator suspects that there is a source of 6GHz interference in the office. Using the troubleshooting methodology, which of the following actions should the network administrator do next?

Options:

A.

Test to see if the changes have improved network performance.

B.

Use a spectrum analyzer and check the 6GHz spectrum.

C.

Document the list of channels that are experiencing interference.

D.

Change the channels being used by the 6GHz radios in the APs.

Buy Now
Questions 13

A customer asks a MSP to propose a ZTA (Zero Trust Architecture) design for its globally distributed remote workforce. Given the following requirements:

    Authentication should be provided through the customer's SAML identity provider.

    Access should not be allowed from countries where the business does not operate.

    Secondary authentication should be added to the workflow to allow for passkeys.

    Changes to the user's device posture and hygiene should require reauthentication into the network.

    Access to the network should only be allowed to originate from corporate-owned devices.

Which of the following solutions should the MSP recommend to meet the requirements?

Options:

A.

Enforce certificate-based authentication.

Permit unauthenticated remote connectivity only from corporate IP addresses.

Enable geofencing.

Use cookie-based session tokens that do not expire for remembering user log-ins.

Increase RADIUS server timeouts.

B.

Enforce posture assessment only during the initial network log-on.

Implement RADIUS for SSO.

Restrict access from all non-U.S. IP addresses.

Configure a BYOD access policy.

Disable auditing for remote access.

C.

Chain the existing identity provider to a new SAML.

Require the use of time-based one-time passcode hardware tokens.

Enable debug logging on the VPN clients by default.

Disconnect users from the network only if their IP address changes.

D.

Configure geolocation settings to block certain IP addresses.

Enforce MFA.

Federate the solution via SSO.

Enable continuous access policies on the WireGuard tunnel.

Create a trusted endpoints policy.

Buy Now
Questions 14

A network architect must ensure only certain departments can access specific resources while on premises. Those same users cannot be allowed to access those resources once they have left campus. Which of the following would ensure access is provided according to these requirements?

Options:

A.

Enabling MFA for only those users within the departments needing access

B.

Configuring geofencing with the IPs of the resources

C.

Configuring UEBA to monitor all access to those resources during non-business hours

D.

Implementing a PKI-based authentication system to ensure access

Buy Now
Questions 15

A company is experiencing Wi-Fi performance issues. Three Wi-Fi networks are available, each running on the 2.4 GHz band and on the same channel. Connecting to each Wi-Fi network yields slow performance. Which of the following channels should the networks be configured to?

Options:

A.

Channel 1, Channel 2, and Channel 3

B.

Channel 2, Channel 4, and Channel 9

C.

Channel 1, Channel 6, and Channel 11

D.

Channel 3, Channel 5, and Channel 10

Buy Now
Questions 16

A network architect is designing a new network for a rural hospital system. Given the following requirements:

    Highly available

    Consistent data transmission

    Resilient to simultaneous failures

Which of the following topologies should the architect use?

Options:

A.

Collapsed core

B.

Hub-and-spoke

C.

Mesh

D.

Star

Buy Now
Questions 17

As part of a project to modernize a sports stadium and improve the customer service experience for fans, the stadium owners want to implement a new wireless system. Currently, all tickets are electronic and managed by the stadium mobile application. The new solution is required to allow location tracking precision within 5ft (1.5m) of fans to deliver the following services:

    Emergency/security assistance

    Mobile food order

    Event special effects

    Raffle winner location displayed on the giant stadium screen

Which of the following technologies enables location tracking?

Options:

A.

SSID

B.

BLE

C.

NFC

D.

IoT

Buy Now
Questions 18

A network administrator is troubleshooting a user's workstation that is unable to connect to the company network. The results of ipconfig and arp -a are shown. The user’s workstation:

CNX-001 Question 18

A router on the same network shows the following output:

CNX-001 Question 18

    Has an IP address of 10.21.12.8

    Has subnet mask 255.255.255.0

    Default gateway is 10.21.12.254

    ARP table shows 10.21.12.8 mapped to 1A-21-11-31-74-4C (a different MAC address than the local adapter)

Options:

A.

Asynchronous routing

B.

IP address conflict

C.

DHCP server down

D.

Broadcast storm

Buy Now
Questions 19

A company provides an API that runs on the public cloud for its customers. A fixed number of VMs host the APIs. During peak hours, the company notices a spike in usage that results in network communication speeds slowing down for all customers. The management team has decided that access for all customers should be fair and accessible at all times. Which of the following is the most cost-effective way to address this issue?

Options:

A.

Use an allow list for customers using APIs.

B.

Increase the number of VMs running APIs.

C.

Enable throttling on APIs.

D.

Increase the MTU on the VMs.

Buy Now
Questions 20

A network engineer is installing new switches in the data center to replace existing infrastructure. The previous network hardware had administrative interfaces that were plugged into the existing network along with all other server hardware on the same subnet. Which of the following should the engineer do to better secure these administrative interfaces?

Options:

A.

Connect the switch management ports to a separate physical network.

B.

Disable unused physical ports on the switches to keep unauthorized users out.

C.

Set the administrative interfaces and the network switch ports on the same VLAN.

D.

Upgrade all of the switch firmware to the latest hardware levels.

Buy Now
Questions 21

A developer reports errors when trying to access a web application. The developer uses Postman to troubleshoot and receives the following error:

    HTTP Status: 403 Forbidden

    Headers include authentication-related variables such as access_key, signature, salt, and timestamp

    The request is a GET request to a payment methods API

CNX-001 Question 21

Which of the following is the cause of the issue?

Options:

A.

Requested element not found

B.

Lack of user authentication

C.

Too restrictive NGFW rule

D.

Incorrect HTTP redirection

Buy Now
Questions 22

A network architect is designing a solution to secure the organization's applications based on the security policy. The requirements are:

    Users must authenticate using one set of credentials.

    External users must be located in authorized sites.

    Session timeouts must be enforced.

    Network access requirements should be changed as needed.

Which of the following best meet these requirements? (Choose two.)

Options:

A.

Role-based access

B.

Single sign-on

C.

Static IP allocation

D.

Multifactor authentication

E.

Conditional access policy

F.

Risk-based authentication

Buy Now
Questions 23

A company hosts a cloud-based e-commerce application and only wants the application accessed from certain locations. The network team configures a cloud firewall with WAF enabled, but users can access the application globally. Which of the following should the network team do?

Options:

A.

Reconfigure WAF rules

B.

Configure a NAT gateway

C.

Implement a CDN

D.

Configure geo-restriction

Buy Now
Questions 24

After a company migrated all services to the cloud, the security auditor discovers many users have administrator roles on different services. The company needs a solution that:

    Protects the services on the cloud

    Limits access to administrative roles

    Creates a policy to approve requests for administrative roles on critical services within a limited time

    Forces password rotation for administrative roles

    Audits usage of administrative roles

Which of the following is the best way to meet the company's requirements?

Options:

A.

Privileged access management

B.

Session-based token

C.

Conditional access

D.

Access control list

Buy Now
Questions 25

An organization has centralized logging capability at the on-premises data center and wants a solution that can consolidate logging from deployed cloud workloads. The organization would like to automate the detection and alerting mechanism. Which of the following best meets the requirements?

Options:

A.

IDS/IPS

B.

SIEM

C.

Data lake

D.

Syslog

Buy Now
Exam Code: CNX-001
Exam Name: CompTIA CloudNetX Exam
Last Update: Jun 8, 2025
Questions: 84

PDF + Testing Engine

$49.5  $164.99

Testing Engine

$37.5  $124.99
buy now CNX-001 testing engine

PDF (Q&A)

$31.5  $104.99
buy now CNX-001 pdf
dumpsmate guaranteed to pass
24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 16 Jun 2025